HOW THE CYBERSECURITY MATURITY MODEL CERTIFICATION (CMMC) WILL - - PowerPoint PPT Presentation

how the cybersecurity maturity model certification cmmc
SMART_READER_LITE
LIVE PREVIEW

HOW THE CYBERSECURITY MATURITY MODEL CERTIFICATION (CMMC) WILL - - PowerPoint PPT Presentation

HOW THE CYBERSECURITY MATURITY MODEL CERTIFICATION (CMMC) WILL IMPACT YOUR BUSINESS ACQUISITION HOUR WEBINAR April 24, 2020 4/24/20 WEBINAR ETIQUETTE PLEASE Log into the GoToMeeting session with the name that you registered with online


slide-1
SLIDE 1

HOW THE CYBERSECURITY MATURITY MODEL CERTIFICATION (CMMC) WILL IMPACT YOUR BUSINESS

ACQUISITION HOUR WEBINAR

April 24, 2020

4/24/20
slide-2
SLIDE 2

WEBINAR ETIQUETTE

PLEASE

  • Log into the GoToMeeting session with the name that you registered with online
  • Place your phone or computer on MUTE
  • Use the CHAT option to ask your question(s).
  • We will share the questions with our guest speaker who will respond to the group

THANK YOU!

4/24/20 Page 2
slide-3
SLIDE 3

Celebrating 32 Years of serving Wisconsin Business!

ABOUT WPI SUPPORTING THE MISSION

4/24/20 Page 3
slide-4
SLIDE 4

Assist businesses in creating, developing and growing their sales, revenue and jobs through Federal, state and local government contracts.

WPI is a Procurement Technical Assistance Center (PTAC) funded in part by the Defense Logistics Agency (DLA), WEDC and other funding sources.

4/24/20 Page 4
  • INDIVIDUAL CONSELING – At our offices, at clients facility or via

telephone/GoToMeeting

  • SMALL GROUP TRAINING – Workshops and webinars
  • CONFERENCES to include one on one or roundtable sessions

Last year WPI provided training at over 100 events and provided service to over 1,200 companies

slide-5
SLIDE 5
  • MILWAUKEE
  • Technology Innovation Center
  • MADISON
  • FEED Kitchens
  • Dane County Latino Chamber of Commerce
  • Wisconsin Manufacturing Extension Partnership

(WMEP)

  • Madison Area Technical College (MATC)
  • CAMP DOUGLAS
  • Juneau County Economic Development

Corporation (JCEDC)

  • STEVENS POINT
  • IDEA Center
  • APPLETON
  • Fox Valley Technical College

WPI OFFICE LOCATIONS

  • OSHKOSH
  • Fox Valley Technical College
  • Greater Oshkosh Economic Development Corporation
  • EAU CLAIRE
  • Western Dairyland
  • MENOMONIE
  • Dunn County Economic Development Corporation
  • LADYSMITH
  • Indianhead Community Action Agency
  • RHINELANDER
  • Nicolet Area Technical College
  • GREEN BAY
  • Advance Business & Manufacturing Center
4/24/20 Page 5
slide-6
SLIDE 6

www.wispro.org

4/24/20 Page 6
slide-7
SLIDE 7

CMMC

How the Cybersecurity Maturit ity Model Certif ification (C (CMMC) Will ill Im Impact Your Business

Marc N. Violante Wisconsin Procurement Institute April 24, 2020

slide-8
SLIDE 8

What we know - Current Cyber Obligations

4/24/2020 8
  • 52.204-21 - Basic Safeguarding of Covered Contractor Information

Systems

  • 252.204-7008 - Compliance with safeguarding covered defense

information controls

  • 252.204-7012 - Safeguarding Covered Defense Information and Cyber

Incident Reporting

  • DON – Geurts memos – CDRL requirements
  • Other requirements
slide-9
SLIDE 9

Information Security Obligations/Requirements

  • 252.204-7000 – Disclosure of Information
  • DOD Directive 5230.25 Withholding of Unclassified Technical Data

from Public Disclosure

  • DOD Instruction 5230.24 Distribution Statements on Technical

Documents

  • Canadian Technical Data Control Regulations (TCDR)
  • State Department, Directorate of Defense Trade Controls
  • Commerce Control List
  • DLA Requirements –
  • DLA Export Control Data Access
4/24/2020 9
slide-10
SLIDE 10

What we don’t know

  • New DFARs (Strategic Assessment) – in addition to 252.204-7012
  • Definitions of/examples of products/services contained in each level
  • Examples of good-acceptable policies/procedures
  • Certification process – “is there more than one correct answer?”
  • Timing
  • Inclusion in RFQs/RFPs
  • Specified CMMC v1.x?
  • Assessor process, engagement, scheduling, cost
  • CMMC Level repository, access to and/or use
  • Clarity with respect to trainers/consultants/etc
  • “Oklahoma Land Rush” – caveat emptor
4/24/2020 10
slide-11
SLIDE 11

CMMC – How much information to expect?

  • Some thoughts
  • CMMC v1.2 is published
  • DFARS 252.204-7012 is current
  • DFARS “Strategic Assessment” – draft rule yet to be published
  • CMMC (Level – 1:5) – award determination
  • Procurement information can be CUI - https://www.archives.gov/cui/registry/category-detail/procurement-acquisition.html
  • Banner Format: CUI//Category Marking//Limited Dissemination Control
  • Material and information relating to, or associated with, the acquisition and procurement of goods

and services, including but not limited to, cost or pricing data, contract information, indirect costs and direct labor rates.

  • Banner Format: CUI//Category Marking//Limited Dissemination Control
  • Per FAR 2.101: any of the following information that is prepared for use by an agency for the

purpose of evaluating a bid or proposal to enter into an agency procurement contract, if that information has not been previously made available to the public or disclosed publicly: (Items 1- 10).

11 4/24/2020
slide-12
SLIDE 12

CMMC – it’s about the “it’s”

  • It’s not static – it will evolve
  • It’s not a one size fits all –
  • Different companies,
  • Different requirements
  • Level of complexity
  • Programs need to be
  • Tailored
  • Monitored – evaluated
  • Updated - refreshed
  • It’s not a checklist – Critical Thinking dominant theme
12 4/24/2020
slide-13
SLIDE 13

Topics to consider

  • Tunnel vision –
  • Singular focus on CMMC (lack of integration with other requirements)
  • Lack of investment
  • time | training | other resources | situational awareness – what’s changing?
  • Mindset
  • What’s important
  • Certification via delegation (designation)
  • Lack of active involvement by top management
4/24/2020 13
slide-14
SLIDE 14

What are the main issues (barriers)

  • Familiarity –What if the question (perspective) were changed?
  • Understanding of –
  • Technology
  • Terms
  • Threat
  • How/why process and/or procedures work
  • How does a process solve a problem?
  • Why is documentation needed?
  • How much is enough?
  • What am I trying to show (demonstrate)?
  • Why can’t I just say – we are doing that?
4/24/2020 14
slide-15
SLIDE 15

The desired end state

  • build
  • a cyber-safe,
  • cyber-secure and
  • cyber-resilient
4/24/2020 15 Ellen M. Lord, Assistant Secretary of Defense for Acquisition, Press Briefing transcript, January 31, 2020

defense industrial base

Another idea that has been frequently used has been the concept of Critical Thinking

slide-16
SLIDE 16

CMMC (FCI v. CUI) – important details

Federal Contract Information (FCI)

  • FAR 52.204-21
  • 15 FAR elements map to 17

CMMC elements

  • Flowdown – substance of clause
  • CMMC v1.2

Controlled Unclassified Information (CUI)

  • DFARS 252.204-7012
  • Adequate Security (NIST 800-171 r2)
  • Malware ID | Capture | “defang” |share
  • Monitor for incidents
  • Report generation –
  • Medium Assurance Certificate
  • Forensics – freeze 90 days
  • “Include this clause, including this

paragraph (m)”

  • CMMC v1.2 – NIST 800-171 r2 + rev b
4/24/2020 16
slide-17
SLIDE 17

Apply definitions – track source dates

4/24/2020 17
  • the subcontractor may have Federal contract information

residing in or transiting through its information system.

  • FAR 52.204-21
  • “Covered contractor information system” means an

unclassified information system that is owned, or

  • perated by or for, a contractor and that processes,

stores, or transmits covered defense information.

  • DFARS 252.204-7012
  • SAFEGUARDING COVERED DEFENSE INFORMATION AND CYBER INCIDENT REPORTING (DEC 2019)
  • CDI = CTI + CUI

Compare

slide-18
SLIDE 18

Background – maturity model

https://www.acq.osd.mil/cmmc/docs/CMMC_ModelMain_V1.02_20200318.pdf pg 4 4/24/2020 18
  • In general, a maturity model is a set of
  • characteristics,
  • attributes,
  • indicators,
  • or patterns
  • that represent capability and progression in a particular discipline.
  • provides a benchmark against which an organization can evaluate the

current level of capability of its

  • processes, practices, and methods and set goals and priorities for

improvement.

slide-19
SLIDE 19

CMMC – definition of a policy

https://www.acq.osd.mil/cmmc/docs/CMMC_Appendices_V1.02_20200318.pdf B-2 4/24/2020 19
slide-20
SLIDE 20

General Relationships

Contract Information Public No Restriction Non Public Company Proprietary Customer Information DoD DFARS 252.204-7000 Distribution List Other Requirements New DFARS ~ Strategic Assessment FCI (L1) FAR 52.204-21 CUI (L3-L5) DFARS 252.204-7008 252.204-7012 4/24/2020 20
slide-21
SLIDE 21

New DFARS

4/24/2020 21
slide-22
SLIDE 22

Information Security - today

4/24/2020 22
  • Categories of information –
  • Federal Contract Information
  • Covered Defense Information = CTI & CUI
  • Controlled Unclassified Information
  • Impact Level
  • Export Controlled
  • JCP
  • ITAR
  • Other
  • Corporate – internal
  • Customer – contract/proprietary
slide-23
SLIDE 23

ID/Know Program Requirements ID & mark each and every document Tailored training for staff Apply program requirements to information Monitor & Update as needed

Commonalities

4/24/2020 23
  • There are requirements – regulations
  • These apply to different categories of information
slide-24
SLIDE 24

CMMC – DoD’s perspective

Department of Defense Press Briefing by Undersecretary of Defense for Acquisition and Sustainment Ellen M. Lord
  • Oct. 18, 2019
4/24/2020 24
slide-25
SLIDE 25

Slight Change

4/24/2020 25
slide-26
SLIDE 26

Become familiar with references

4/24/2020 26 FIPS Publication 200: Minimum Security Requirements for Federal Information and Information Systems; pg 2

Specifications for Minimum Security Requirements

slide-27
SLIDE 27

Cause and Effect

  • “Adversaries know that in today's great power competition

environment, information and technology are both key cornerstones and -- and attacking a sub-tier supplier is far more appealing than a prime.

  • “ We know that the adversary looks at our most vulnerable link,

which is usually six, seven, eight levels down in the supply chain. So right now, there are a number of primes who have come up with some ideas about how to more cost-effectively accredit small and medium businesses.”

  • “CMMC is a critical element of DOD's overall cybersecurity
  • implementation. ”
4/24/2020 27 Ellen M. Lord, Assistant Secretary of Defense for Acquisition, Press Briefing transcript, January 31, 2020
slide-28
SLIDE 28

CMMC – in general

  • 5 Levels
  • Companies will determine/select an appropriate level for them
  • Selection keyed to prime’s and/or customer’s need
  • Level will be indicated in DoD solicitations
  • All companies will be certified – no exemptions
  • At a minimum companies will certify to Level 1 ~ FAR 52.204-21
  • Level 2 – bridge from Level 1 to Level 3 (solicitation will not be Id’d as Level 2)
  • Level 3 – CUI
  • Levels 4 and 5 – small number of companies dealing with highly sensitive CUI
  • Periodic recertifications will be required
4/24/2020 28

*

slide-29
SLIDE 29

CMMC – “all companies will be certified

4/24/2020 29

Arrington said at an event Friday the Pentagon will clarify which parts of a contract will demand different levels of certification in upcoming requests for information. “One size doesn’t fit all for security,” Arrington said. “The subs, by what work they are doing, will need to meet a level one or level two.”

https://www.govconwire.com/2020/03/katie-arrington-firms-wont-need-to-meet-same-level-of-cmmc-requirements-on-contracts/
slide-30
SLIDE 30

CMMC – “all companies will be certified

4/24/2020 30
  • Assessors will receive a license at a level that matches the

assessments they are permitted to conduct. In the very near future, all contractors that do business with the DoD will need to meet at least Level 1 CMMC requirements.

https://www.cmmcab.org/assessors
slide-31
SLIDE 31

Figure 4 – CMMC Domains (Red = Level 1)

4/24/2020 31
slide-32
SLIDE 32

The “Big Six” (105 of 171 practices)

4/24/2020 32 https://www.acq.osd.mil/cmmc/docs/CMMC_ModelMain_V1.02_20200318.pdf pg 11

AC – 26 SC - 27

slide-33
SLIDE 33

The ink is still wet!

4/24/2020 33
slide-34
SLIDE 34

Current milestones

  • CMMC Accreditation Board – established – January 2020
  • CMMC V1.0 issued – Friday, January 31, 2020
  • See: https://www.acq.osd.mil/cmmc
  • Briefing slides
  • CMMC Model v1.0 pdf
  • References
  • Note CMMC v1.0 is being updated and will be replaced by v1.02
  • See: https://www.acq.osd.mil/cmmc/updates.html
4/24/2020 34
slide-35
SLIDE 35

CMMC A.B.– key players

  • CMMC Accreditation Board – see:

https://www.cmmcab.org

  • Board –
  • Assessors – will perform the onsite review
  • C3PAO –
  • the organizations where licensed assessors will come

together hone their skills and register their licenses.

  • C3PAO’s will require certification by CMMC A.B.
  • Trainers – trainers will train the assessors (~ 10,1000+)
  • Staff
4/24/2020 35
slide-36
SLIDE 36

Under Sec ecretary of

  • f De

Defense Ellen llen Lo Lord statement on

  • n mis

islea eadin ing cy cybersecurit ity cert certific ication in informati tion Statement fr from Under Secretary of

  • f De

Defense Ellen llen Lo Lord:

  • Since I introduced the Cybersecurity Maturity Model Certification model last year, I have

consistently stressed the importance of communicating and engaging extensively with industry, academia, military services, the Hill and the public to hear their concerns and suggestions. The purpose of this communication was, and still is, to ensure everyone fully understands the intent, process and requirements of CMMC to fight the very real threats that drive us to require rigorous cybersecurity. Unfortunately, the Department has learned that some third-party entities have made public representations of being able to provide CMMC certifications to enable contracting with

  • DoD. The requirements for becoming a CMMC third-party assessment organization (C3PAO) have

not yet been finalized, so it is disappointing that some are trying to mislead our valued business

  • partners. To be clear, there are no third-party entities at this time who are capable of providing a

CMMC certification that will be accepted by the Department. At this time, only training materials

  • r presentations provided by the Department will reflect our official position with respect to the

CMMC program. I have also reached out to the presidents of the PSC, AIA and NDIA industry associations to make them aware as well, and they remain connected with my CMMC team.

4/24/2020 36 https://www.cmmcab.org/
slide-37
SLIDE 37

In their (CMMC A.B.) own words – re: C3PAO

https://www.cmmcab.org/assessors 4/24/2020 37 Note: Assessors are required to obtain a security clearance. The specific clearance levels are not yet determined.
slide-38
SLIDE 38

Prospective Assessors & C3PAOs

4/24/2020 38 https://www.cmmcab.org/faq
slide-39
SLIDE 39

Time Line

  • Late spring/early summer timeframe to

complete a new defense acquisition regulation, a new Defense Federal Acquisition Regulation, or DFAR.

  • CMMC requirement in selected RFIs [request

for information] in the June 2020 timeframe

  • Corresponding RFPs [request for proposals] in

September 2020 time frame, where CMMC standards will be required at the time of contract award.

4/24/2020 39

CMMC DFARS

slide-40
SLIDE 40 Timeline charge from January 31, 2020 Press Briefing 4/24/2020 40
slide-41
SLIDE 41 https://www.cmmcab.org/ scroll to bottom of home page

Active Development Process

41 4/24/2020
slide-42
SLIDE 42

Major Milestones

  • The department is working with the military services and agencies to

identify candidate programs that will implement the CMMC requirements during the F.Y. 2021 through F.Y. '25 phased rollout.

  • All new DOD contracts will contain the CMMC requirements, starting

in F.Y. '26.

  • Consequently, organizations working with the DOD will need a CMMC

certification within the next five years.

4/24/2020 42
slide-43
SLIDE 43

Target numbers – roll out (pathfinder projects)

  • Q: Is there a target number for how many initial RFIs will be rolled
  • ut this summer with CMMC? And then, will that be a sort of

deliberate mix of a percentage of Level 3, Level 4, Level 5?

  • MS. ARRINGTON: We're targeting 10 RFIs and 10 RFPs this year.
  • We figured that with each one, we've assumed that there would be

150 subcontractors along that in some capacity.

  • So 10 contracts with 150 contractors per. And yes, it will be a
  • mix. We'll have some CMMC Level 3, CMMC Level 1, and there may

be one or two that have the 4 or 5 CMMC levels going out. But we are working those.

4/24/2020 43 Ms Arrington, Press Briefing transcript, January 31, 2020
slide-44
SLIDE 44

CMMC Marketplace

  • Coming in the future
  • Portal to schedule accreditation visits
  • CMMC A.B. will establish requirement for candidate C-3PAOs and

individual assessors.

  • the CMMC will -- A.B. -- will provide updates on training classes,

which are planned to start in early spring 2020.

  • After the A..B. -- the CMMC A.B. certifies C-3PAOs, companies will be

able to schedule CMMC assessments for specific levels through a CMMC marketplace portal.

4/24/2020 44
slide-45
SLIDE 45

CMMC Marketplace – new information

  • MOU (DoD & CMMC-AB has been signed)
  • DFARS case in progress; new rule by end of FY
  • First training class in progress
  • Possible COVID related delays
  • Pathfinder contracts initiated
  • Initial CMMC activity with Missile Command
  • At completion of ___ six month ramp up to full implementation
  • Questions concerning certification of all subcontractors
  • Be watchful of “posers”; those offering certification. There are none!
4/24/2020 45
slide-46
SLIDE 46

Related to “Critical Thinking” and integration of various requirements

4/24/2020 46
slide-47
SLIDE 47

Mindset = #1

  • Protection efforts cannot be viewed as a managing a checklist.
  • Recurring concept heard in DoD briefings
  • Critical Thinking Skills – with respect to cyber (mentioned not defined)
  • CMMC is not a “thing” an endpoint a destination – given the evolving and

growing cyber threats.

  • A key and major step will be document/information management
  • Every document – piece of information needs to be categorized & marked
  • Public, Company Private, Customer Private, JCP, ITAR, CUI, FCI or other
  • Additionally, every employee needs to be (re)/trained on company procedures
  • Implementation needs to integrate with other programs/information
4/24/2020 47
slide-48
SLIDE 48

Information – life cycle, general elements

Receipt Marking Storage Use Sharing Destruction
  • Auditing
  • Awareness
  • Controls
  • Deliverables
  • Information – source(s)
  • Monitor – test
  • Questions to KO, other
  • Training
  • Transmittal registry
  • Update procedures
M.N. Violante, WPI – Nov 2017 4/24/2020 48
slide-49
SLIDE 49

Paragraph (l) – 252.204-7012

(l) Other safeguarding or reporting requirements. The safeguarding and cyber incident reporting required by this clause in no way abrogates the Contractor’s responsibility for other safeguarding or cyber incident reporting pertaining to its unclassified information systems as required by other applicable clauses of this contract, or as a result of other applicable U.S. Government statutory

  • r regulatory requirements.
4/24/2020 49
slide-50
SLIDE 50

Key Elements

Information Program(s) Channel Recipient Needed controls & limitations 4/24/2020 50
slide-51
SLIDE 51

Example – Integrated requirements (slide 1 of 3)

  • 59 - Single Channel Ground & Radio System (1) – FBO Item
  • These items are the components of Interconnecting Group ON-373B/GRC; end system Single Channel

Ground and Airborne Radio System (SINCGARS).

  • The Government owns the technical data package (TDP) for the items. The TDPs will include drawings and

Gerber files. The TDPs are subject to ITAR; refer to statement below.

  • NOTE: The TDPs will NOT be released at this time.
  • INTERNATIONAL TRAFFIC IN ARMS REGULATIONS
  • The technical data package (TDP) for this item is subject to the International Traffic in Arms Regulations

(ITAR). All technical documents for SINCGARS include but not limited to, test plans, test reports, drawings and specifications contains information that is subject to the controls defined in the International Traffic in Arms Regulation (ITAR). This information shall not be provided to non- U.S. persons or transferred by any means to any location outside the United States Department of State.

https://www.fbo.gov/notices/0e1d8fa0af22781f98263ce131214688 - posted February 25, 2019 4/24/2020 51
slide-52
SLIDE 52

Integrated example (slide 2 of 3)

  • A company wishing to receive the TDPs must have an active status in

the Defense Logistics Agency Joint Certification Program (JCP).

  • Once your company has been verified to have active status in JCP, we

will upload the TDPs will be uploaded into AMRDEC Safe Access File Exchange (SAFE). You will then receive an e-mail from the AMRDEC SAFE site, https://safe/amrdec.army.mil/safe/, with a link to the package ID and a password.

  • The TDPs may contain drawings in C4 format. Software to view C4

drawings is available for download through

https://www.fbo.gov/notices/0e1d8fa0af22781f98263ce131214688 - posted February 25, 2019 4/24/2020 52
slide-53
SLIDE 53

Integrated example (slide 3 of 3)

  • COVERED DEFENSE INFORMATION (CDI)

Note regarding DFARS 252.204-7008 and DFARS 252.204-7012: The Government not including or identifying CDI at this time does not constitute a lack of CDI for this solicitation/award 52.204-21 BASIC SAFEGUARDING OF COVERED CONTRACTOR INFORMATION SYSTEMS JUN/2016 (a) Definitions. As used in this clause- "Covered contractor information system" means an information system that is owned or operated by a contractor that processes, stores, or transmits Federal contract information. "Federal contract information" means information, not intended for public release, that is provided by or generated for the Government under a contract to develop or deliver a product or service to the Government, but not including information provided by the Government to the public (such as

  • n public Web sites) or simple transactional information, such as necessary to process payments.
53

One solicitation – ITAR – JCP – CDI (DFARS 252.204-7012) & FCI (FAR 52.204-21)

4/24/2020
slide-54
SLIDE 54

Distribution Statement A - example

Attachment to client email

4/24/2020 54
slide-55
SLIDE 55

Distribution Statement A – example 2

4/24/2020 55
slide-56
SLIDE 56

Distribution Statements – as an example

  • A. Approved for public release.
  • B. U.S. Government agencies only
  • C. U.S. Government agencies and their contractors
  • D. Department of Defense and U.S. DoD contractors only
  • E. DoD Components only
  • F. Further dissemination only as directed by controlling office

DoDI 5230.24, August 23, 2012 Change 3, 10/15/2018

4/24/2020 56
slide-57
SLIDE 57

THIRD PARTY-IMPOSED DISTRIBUTION STATEMENTS

  • Contractors are generally allowed to retain ownership of the

intellectual property that is embodied in technical data, documents,

  • r information that is delivered or otherwise provided to the

Government.

  • Restrictive markings are either required or permitted on all forms of

technical data or computer software that is to be delivered to DoD.

DoDI 5230.24, August 23, 2012 Change 3, 10/15/2018 4/24/2020 57
slide-58
SLIDE 58

Hypothetical – maybe not

58

Machining process (CUI +) Program issue – Machine malfunction Part > scrap Part to shop floor bin Shop bin emptied to recycling dumpster Dumpster is emptied “Scrap” transported to tipping/sorting facility Scrap is sorted and processes Scrap is sold

4/24/2020
slide-59
SLIDE 59

Hypothetical with an evil twist – of course

  • Scrap/recycling company is new
  • Attractive price for new or transitioning customers
  • Contract – service agreement signed
  • Service initiated
  • No due-diligence
  • Company does not qualify as a U.S. Person
  • Scrap/recycling is a ruse – mining DoD manufacturer’s waste stream
  • Items select and sold/sent to ….
4/24/2020 59
slide-60
SLIDE 60

Checklist – No – First Principles - Yes

https://www.acq.osd.mil/cmmc/docs/CMMC_Appendices_V1.02_20200318.pdf B-14 4/24/2020 60
slide-61
SLIDE 61

CUI = Single State Information – so what?

4/24/2020 61 NIST SP 800-171 r1, page 6
slide-62
SLIDE 62

Reference – DD Form 2345 - JCP

4/24/2020 NIST (SP) 800-171 Revision 1, December 2016

3.8.1 Protect (i.e., physically control and securely store) system media containing CUI, both paper and digital.

62
slide-63
SLIDE 63

Identify relationships and references

63 4/24/2020
slide-64
SLIDE 64

FIPS - encryption

4/24/2020 64

§120.54 Activities that are not exports, reexports, retransfers, or temporary imports. (a) The following activities are not exports, reexports, retransfers, or temporary imports: (5) Sending, taking, or storing technical data that is: (i) Unclassified; (ii) Secured using end-to-end encryption; (iii) Secured using cryptographic modules (hardware or software) compliant with the Federal Information Processing Standards Publication 140–2 (FIPS 140–2) or its successors, supplemented by software implementation, cryptographic key management, and other procedures and controls that are in accordance with guidance provided in current U.S. National Institute for Standards and Technology (NIST) publications, or by other cryptographic means that provide security strength that is at least comparable to the minimum 128 bits of security strength achieved by the Advanced Encryption Standard (AES– 128);

DEPARTMENT OF STATE 22 CFR Part 120 [Public Notice: 10946] RIN 1400–AE76 International Traffic in Arms Regulations: Creation of Definition of Activities That Are Not Exports, Reexports, Retransfers, or Temporary Imports; Creation of Definition of Access Information; Revisions to Definitions of Export, Reexport, Retransfer, Temporary Import, and Release
slide-65
SLIDE 65

Windows and FIPS encryption

4/24/2020 65 https://docs.microsoft.com/en-us/windows/security/threat-protection/fips-140-validation; November 4, 2019

FIPS 140-2 standard overview The Federal Information Processing Standard (FIPS) Publication 140-2 is a U.S. government standard that defines minimum security requirements for cryptographic modules in information technology products, as defined in Section 5131 of the Information Technology Management Reform Act of 1996. The Cryptographic Module Validation Program (CMVP), a joint effort of the U.S. National Institute of Standards and Technology (NIST) and the Canadian Centre for Cyber Security (CCCS), validates cryptographic modules against the Security Requirements for Cryptographic Modules (part of FIPS 140-2) and related FIPS cryptography standards. The FIPS 140-2 security requirements cover eleven areas related to the design and implementation of a cryptographic

  • module. The NIST Information Technology Laboratory operates a related program that validates

the FIPS approved cryptographic algorithms in the module.

slide-66
SLIDE 66

Information management considerations

  • ITAR – Definition: Defense Article
  • This term includes technical data recorded or stored in any physical

form, models, mockups or other items that reveal technical data directly relating to items designated in §121.1 of this subchapter. It also includes forgings, castings, and other unfinished products, such as extrusions and machined bodies, that have reached a stage in manufacturing where they are clearly identifiable by mechanical properties, material composition, geometry, or function as defense articles.

22 CFR §120.6 Defense article.

66 4/24/2020
slide-67
SLIDE 67

Some things

  • Mindset
  • Commitment
  • Resources
  • Awareness of programs and their requirements
  • References
  • Training
  • Maintenance & updates
4/24/2020 67
slide-68
SLIDE 68

Develop you key questions – such as

  • How do you know?
  • How do you identify?
  • How do you account for?
  • How do you track?
  • Who can access?
  • Do you have processes and procedures?
  • What records do you maintain/retain?
  • How frequently do you test?
4/24/2020 68
slide-69
SLIDE 69

Establish and Maintain a Compliance Program

Program elements:

  • Fully supported by senior management
  • Regularly reviewed/updated
  • Research & apply references
  • Clearly documented in writing
  • Tailored to the business
  • Tailored to information being handled
  • Training (periodic/as needed) conducted; documented
  • Outward looking component – feedback, current external issues
69 4/24/2020
slide-70
SLIDE 70

Create/manage information census

  • Identify –
  • Information held
  • Responsible individual
  • Location
  • Program
  • Storage requirements
  • Marking requirements
  • Sharing restrictions
  • Destruction requirements
  • Update records as needed
70 4/24/2020
slide-71
SLIDE 71

Key management/security requirements

  • Solicitation Review
  • Identification of data/information requirements
  • Identify team members
  • Advise of requirements
  • Create limited access space
  • Control access, information and time (functional, specified, unlimited)
  • Detail requirements – sharing, copying, transmission
71 4/24/2020
slide-72
SLIDE 72

Training

Secretary of the Navy, Cybersecurity Readiness Review, March 2019, page s 19 &20

Train: Teach individuals the concepts to perform the functions within the organization and how to be an asset. Implement entry-level professional education. Ensure training is relevant and updated to keep pace with the changing environment.

4/24/2020 72
slide-73
SLIDE 73

Useful resources

  • CMMC Model v1.0 – https://www.acq.osd.mil/cmmc PDF (28 pages)
  • CMMC Model v1.0 Appendices PDF (338 pages)
  • References Appendix F - 83
  • Jan 31, 2020 Press Briefing video
  • Jan 31, 2020 Press Briefing transcript – https://www.defense.gov
  • CMMC Accreditation Board - https://www.cmmcab.org
  • CUI – https://www.archives.gov/cui > CUI Registry
  • CUI Implementing Directive – 32 CFR Part 2002
  • Federal Contract Information (FCI) 48 CFR 52.204-21
  • DFARS 252.204-7012 – NIST 800-171 r1
4/24/2020 73
slide-74
SLIDE 74

News Worthy

  • NIST SP 800-53 Revision 5 Represents a Multi-Year Effort to Develop

Next-Generation Security and Privacy Controls

  • The National Institute for Standards and Technology (NIST) has published the

draft version of SP 800-53 (revision 5): Security and Privacy Controls for Information Systems and Organizations. This is the first update to SP 800-53 since revision 4 was published seven years ago, and reflects the major changes to the security landscape over the last few years.

4/24/2020 74
slide-75
SLIDE 75

DoDProcurementtoolbox.com

https://dodprocurementtoolbox.com/

4/24/2020 75
slide-76
SLIDE 76

Strategically Implementing Cybersecurity Contract Clauses

4/24/2020 76
slide-77
SLIDE 77

Defense Pricing and Contracting

4/24/2020 77 https://www.acq.osd.mil/dpap/pdi/cyber/index.html
slide-78
SLIDE 78

Guid idance for r Ass ssessin ing Co Compli liance and Enhancin ing Protectio ions Requir ired by DFARS Cla lause 252.204-7012, Sa Safeguardin ing Covered Defense In Inform rmatio ion and Cy Cyber In Incid ident Report rtin ing

  • DoD Guidance for Reviewing System Security Plans and the NIST SP

800-171 Security Requirements Not Yet Implemented

  • Guidance for Assessing Compliance of and Enhancing Protections for

a Contractor's Internal Unclassified Information System

  • Strengthening Contract Requirements Language for Cybersecurity in

the Defense Industrial Base

  • Addressing Cybersecurity Oversight as Part of a Contractor's

Purchasing System Review

  • Strategically Implementing Cybersecurity Contract Clauses
4/24/2020 78 https://www.acq.osd.mil/dpap/pdi/cyber/guidance_for_assessing_compliance_and_enhancing_protections.html
slide-79
SLIDE 79

Somethings to watch for

4/24/2020 79
  • CMMC v1.0 is still being referred to as “Draft” v1.02 in process
  • Are there changes in progress
  • CMMC v1.X applies to programs, processes and procedures
  • This is being referred to as Phase I
  • CMMC Phase II – will apply to hardware
  • Foreign governments and other Agencies have expressed interest in

the MM

  • Note: DOE is on their CMMC version 2
slide-80
SLIDE 80

Additional items to watch for

4/24/2020 80
  • NIST released SP – Privacy
  • Note, there are three FAR clauses that address Privacy
  • Will Privacy be included into CMMC?
slide-81
SLIDE 81

UPCOMING TRAINING - EVENTS

4/24/20 Page 81
slide-82
SLIDE 82

ACQUISITION HOUR LIVE WEBINARS SERIES

Page 82 4/24/20
  • April 24, 2020
  • How the CyberSecurity Maturity Model

Certification (CMMC) Will Impact Your Business

CLICK HERE for additional information Presented by Marc Violante, Wisconsin Procurement Institute (WPI)

  • April 29, 2020
  • Economic Espionage – Awareness of

Threats & Resources for Gov’t Contractors

CLICK HERE for additional information Presented by Marc Violante, Wisconsin Procurement Institute (WPI)

  • May 5, 2020
  • Learning About the Surety Bond

Guarantee from the US SBA

CLICK HERE for additional information Presented by the US Small Business Administration

  • May 19, 2020
  • Pieces of the Proposal Puzzle

CLICK HERE for additional information Presented by Helen Henningsen, Wisconsin Procurement Institute (WPI)

slide-83
SLIDE 83

ACQUISITION HOUR LIVE WEBINARS SERIES

Page 83 4/24/20

…More at wispro.org/events

  • May 20, 2020
  • The Procurement Integrated Enterprise

Environment (PIEE) and Wide Area Workflow (WAWF)

CLICK HERE for additional information Presented by the Benjamin Blanc, Wisconsin Procurement Institute (WPI)

  • May 29, 2020
  • How the CyberSecurity Maturity Model

Certification (CMMC) Will Impact Your Business

CLICK HERE for additional information Presented by Marc Violante, Wisconsin Procurement Institute (WPI)

  • June 9, 2020
  • Intellectual property for Government

Contractors and Subcontractors and the STTR/SBIR Stakeholder

CLICK HERE for additional information Presented by Laura Grebe, Husch Blackwell

  • June 10, 2020
  • Negotiation Strategies in Federal

Contracting

CLICK HERE for additional information Presented by Helen Henningsen, Wisconsin Procurement Institute (WPI)

slide-84
SLIDE 84 https://www.wispro.org/event/14th-annual-wisconsin-government-business-opportunities-conference-gobc/

Check it out:

4/24/20 Page 84

CHECK IT OUT!

slide-85
SLIDE 85

A CRITICAL NOTICE FROM WPI

  • If you are a current FEDERAL / DOD CONTRACTOR or SUBCONTRACTOR – you may

have CYBER – DATA SECURITY REQUIREMENTS in your contract.

  • If you are responding to any CURRENT FEDERAL SOLICITATIONS - be aware of your
  • bligations:
  • Key clauses are 52.204-21, 252.204-7008 and 252.204-7012
  • Review for other possible requirements
  • If you are a DOD CONTRACTOR or SUBCONTRACTOR – you will have new CYBER

COMPLIANCE – CERTIFICATION REQUIREMENTS that may impact your business as early as the end of this calendar year.

  • See: https://www.acq.osd.mil/cmmc and https://www.cmmcab.org for more up to date

information.

  • Contact Marc Violante at WPI - marcv@wispro.org or 920-456-9990
Page 85 4/24/20
slide-86
SLIDE 86

QUESTIONS?

4/24/20 Page 86
slide-87
SLIDE 87

SURVEY

4/24/20 Page 87
slide-88
SLIDE 88

CPE Certificate available, please contact: Benjamin Blanc benjaminb@wispro.org

CONTINUING PROFESSIONAL EDUCATION

4/24/20 Page 88
slide-89
SLIDE 89

PRESENTED BY

Wisconsin Procurement Institute (WPI)

www.wispro.org

Marc Violante, Wisconsin Procurement Institute

marcv@wispro.org | 920-456-9990 10437 Innovation Drive, Suite 320 Milwaukee, WI 53226

4/24/20 Page 89